1 tool of the trade – pervasive and embedded mobile systems chapter 8 of mobile commerce and...

35
1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

Upload: kristina-knight

Post on 26-Dec-2015

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

1

Tool of the Trade – Pervasive and embedded mobile systems

Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

Page 2: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

2

Pervasive 普遍的 , 蔓延的 , 滲透的 Computing

Defining pervasive computing Technologies within the pervasive computing domain Networked pervasive computing Embedded systems ergonomics Wearable computing Biometric systems Biometric issues and systems security Biometric system applications Biometric systems integration Digital signatures Automobile telematics and vehicle telemetry Universal Information Appliances (UIAs) Obstacles

Page 3: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

3

Defining pervasive computing

Used interchangeably with the term ‘ubiquitous到處存在的 computing’

Freed from the PC desktop, and embedded in static and mobile devices that are in communication with one another via wireless telecommunications

Within the pervasive computing systems environment, computing is spread and distributed throughout are predominately mobile.

Page 4: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

4

Key concepts for pervasive computing

Mobility 移動性 indicates the quality of being mobile; able to move about easily, speedily, unfixed, and changing rapidly

Embedding 嵌入 indicates the process of including, subsuming 包容 and engendering 形成 objects with physical and logical qualities

Ubiquity 到處存在 indicates the quality of existence everywhere, and all around, often the same time

Page 5: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

5

Characteristics of pervasive computing

Numerous, casually accessible, often invisible computing devices;

Frequently mobile or embedded in the systems environment;

Connected to an increasingly ubiquitous network infrastructure

Page 6: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

6

Technologies within the pervasive computing domain

Technological and conceptual drives: Intelligent, mobile and portable devices; Intelligent agent applications triggered by

sensing the environment; Distributed networking environments mediated

by wireless telecommunications Convenient, unobtrusive 客氣的 access to

relevant information anywhere and any time; Richness of location-based information and

applications

Page 7: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

7

Desirable characteristics of embedded smart devices

Unobtrusively embedded Completely connected Intuitive intelligence Effortlessly portable and mobile Constantly on and available

Page 8: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

8

Areas of applications

Smart rooms Wearable computing Automotive telemetry Information appliances

Page 9: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

9

Technologies for pervasive computing

Gesture recognition Speech recognition Intuitive interfaces Hardware circuitry

Page 10: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

10

Networked pervasive computing

Translate and integrate conventional computer networks into the pervasive systems domain Creating environments for networking and other

technology convergence 集中 in pervasive computing

Changing information systems, processes and procedures to enable a higher level of integration

Creating proactive and sensor-based systems as well as reactive systems environments

Creating open systems environments that enable a deeper level of user interaction with systems.

Page 11: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

11

Factors for convergence in networked pervasive computing

Embedding common software applications in the world around us

Embedding natural-language speech recognition devices into mediated user environments;

Using lower power, or self-powering, devices that require little maintenance;

Ensuring robust transmission and security within the networked environment

Page 12: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

12

1st generation pervasive computing - Applications

Traditional networked systems are used in new and innovative ways Gyms and fitness suites that equip exercise machines with Internet

access so that people using exercise bikes and rowing machines may engage with the Internet while sedentary

Elevators in office building and hotels that have embedded display screens to enable the people using them to have constant access to Internet-provided daily news, or to advertising data tailored to the perceived needs of different captive audiences

Household appliances that are connected to information and applications. ( ie microwave cookers that can download recipes and automatically set the correct time and temperature necessary to produce a perfectly cooked meal )

Elevators that are instinctively aware of their own performance parameters and maintenance lifecycles, so that faults and service intervals can be automatically communicated back to the provider of the elevator;

Broadband and digitally enabled television sets which enable access to the Internet and encourage interactive involvement with products an services.

Page 13: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

13

2nd generation pervasive computing (and beyond)

Toward device integration, such as the use of portable, unobtrusive information appliances that are on, or about, a human being.

Many connections are initiated reactively as the person moves about (and interacts with) their world.

Biometrics and wearable computing Create a PAN rather a LAN environment

that allows effective device integration and human computer interaction

Page 14: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

14

Embedded systems ergonomics

Common ergonomic factors: Convenience often depends upon the

purpose and location of technology. Interleaved with human behaviour such

as cultural attitude to business and technology, and geographical region

Devices should fit in with human lifestyles, allowing interpersonal pervasive computing.

Page 15: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

15

Wearable computing

1st generation: eyeglasses and wristwatches that contain powerful computing applications (portable, mobile and conveniently worn by people)

2nd generation: embedding of small devices into clothing or more (surgical implanting of computer chips into the skin, organs, and body of a human being)

Page 16: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

16

Wearable computing – 6 attributes Unmonopolizing of the user’s attention: It does not

cut you off from the outside world like a virtual reality game.

Unrestrictive to the user: you can do other things while using it.

Observable by the user: It can get your attention continuously if you want it to.

Controllable by the user: You can grab control of it at any time you wish.

Attentive to the environment: Environmentally aware, multimodal, multisensory.

Communicative to others: Can be used as a communications medium when you want it to.

Page 17: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

17

Biometric systems

Automated computing systems to identify people by their physiological or behavioural characteristics

Biometrics is concerned with measuring human characteristics for the purpose of identifying human beings.

Page 18: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

18

Features measured in biometrics:

Facial characteristics and feature identification

Fingerprint identification Hand geometry measurement and

identification Handwriting appraisal and identification Iris and retinal identification Voice measurement and authentication

Page 19: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

19

Three ways to identify a human being

Something the user knows: PIN Something the user has: smart card Something the user is: fingerprint

biometric security naturalistic, convenient, and sits well with

the general concept of pervasive computing

Page 20: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

20

Fingerprints

Use pattern-matching of fingertips Pattern-matching devices Fingerprint matching is a relatively

cost-effective security technique. E.g. area access

Page 21: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

21

Hand geometry

Involve analyzing and measuring the shape and natural characteristics of the hand

E.g. auditing and monitoring staff movement through a building, time and attendance recording and monitoring, and secure area admittance

Page 22: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

22

Facial features

Involve analyzing facial features and characteristics (3-dimentaional recognition)

Rely on digital imaging of human features to develop a facial image of a human user for the purposes of identification

Possess high levels of statistical accuracy E.g. ‘tricksters’ of casinos - to match and

identify those on its database

Page 23: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

23

Eye features

2 areas: iris analysis and retina analysis Retina biometrics

Involve scanning and analyzing the layer of blood vessels situated at the back of the eye

The pattern, size and distribution of the blood vessels form a unique human identifier.

The back of the eye is scanned using a low-intensity light source to determine the unique patterns of the retina.

The user has to place their face accurately into the coupler device so that they can focus on a given source of light at the correct angle => intrusive

Iris biometrics Use simpler camera scanning equipment No close contact between the iris and scanning equipment

Page 24: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

24

Voice features

2 forms: wave modulation of a human voice, and “voice-to-print” (voice is translated to text)

Less accurate: because ambient noise and mood can affect verification

Less developed as to eye or facial biometrics

Page 25: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

25

Signature features

Involve the analysis of the written human signature, either in real time or historical time

Signature include speed, flow, and pressure (in real time) as well as the shape and nature of the final signature (in historical analysis)

Used for thousands of years

Page 26: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

26

Biometric issues and systems security - factors

Ease of use Intrinsic error effects Device accuracy User acceptance Cost to benefit Stability of technology Required security level

Page 27: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

27

Biometric issues and systems security

Two different methods to assess biometric accuracy: False Acceptance Rate (FAR)

– the percentage of impostors incorrectly matched to a genuine and valid user’s biometric template;

False Rejection Rate (FRR) – the percentage of incorrectly rejected genuine and valid users

FRR

FAR

Crossover Error Rate (CER)

0

Page 28: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

28

Biometric systems applications

To restrict or permit access to secure physical zones

To control virtual access within computerized system environments (To authenticate financial transactions

Areas: in military buildings and other areas of high danger, such as laboratories in the pharmaceutical industry

Advantages: reduction in the number of human beings, for environments of high-volume access control additional security – 2 or 3 factor authentication Enable personnel to be security coded into different levels

in a military (and government) buildings

Page 29: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

29

Biometric systems integration

4 elements of a biometric system infrastructure The integration of the devices and technologies used to

physically recognize a human feature The capture, storage and enrolment of human being’s

characteristics and features into a digitized database The retrieval of the biometric template from the storage

devices and the subsequent verification of the unique biometric characteristics of the person

An audit trail record of user interaction with a secure system

Trust and reliability are essential aspects in biometric systems adoption.

Page 30: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

30

Digital signatures

Similar manner to hand-written signatures

Use PKI to verify the identity of a sender of a message

Refer to Cryptography Notes

Page 31: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

31

Automobile telematics and vehicle telemetry The use of embedded computerized systems in

automobiles Telematics is the convergence of wireless technology,

Global Positioning Systems (GPS), onboard electronics and information entertainment services.

The use of wireless technology to remotely monitor the performance of a vehicle

Applications: Ro remotely inform a network operator of an airbag being

deployed and even guide emergency services to the location of an accident via GPS technology

Automatic phone messaging to inform an automobile owner that their car alarm is sounding

To lock and open automobiles, access Internet data, and locate the movement of the automobile

Safety and security issues

Page 32: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

32

Universal Information Appliances (UIAs)

Always on, always connected to its environment, and portable enough to be unobtrusively carried around by its owner

No such device! Three features of UIAs

Dynamic user interface design – a device consideration

Open wireless infrastructure – a communications consideration

Software system integration – an applications consideration

Page 33: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

33

UIAs characteristics

Be convenient to the user Enhance the user’s productivity Fit seamlessly into a user’s lifestyle

Page 34: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

34

Obstacles in pervasive computing

Need UIAs Environmental obstacles

Regional, national, social and cultural differences in the adoption and user of technologies

Uncommon technology standards and a a lack of open systems

Untested business opportunities and lack of awareness of customer and user preferences

Human resistance to unnatural technologies and applications

Page 35: 1 Tool of the Trade – Pervasive and embedded mobile systems Chapter 8 of Mobile Commerce and Wireless Computing Systems by Geoffrey Elliot and Nigel Phillips

35

Successful pervasive computing systems

Wireless network infrastructures (hardware)

Enabling and intelligent applications (software)

Portability, connectivity, and convenience (mobility)